Deutsche Version

Research project


Joint project KMU Innovativ
Research area: Communication Systems, IT Security
Duration: 01.09.2007 - 29.02.2020


Secure fog connection layer for IoT applications

In logistics, there is a high density of data that needs to be accessed in different places and by different people. In this case, a variety of information on the goods to be transported is crucial: weight, size, content (dangerous goods, fragile or perishable goods), temperature, humidity (important, especially for the transport of perishable goods), customs information (time, note), last opening of the Containers (time, person), destination, starting location, position log (GPS), and possibly a variety of other parameters.

This information is required throughout the transport process, as it depends on, for example, fuel quantities, loading position and customs restrictions. However, it is not optimal to make these constantly available via the cloud, although they can be collected and provided locally through sensors on the container and local gateways. Local access to this information via a "new" link layer can significantly increase efficiency in logistics, but also in many other fields of application in the (future) Internet of Things (IoT) (shorter data provision times, less traffic between gateway and cloud, better utilization of local hardware resources, lower power consumption of the terminals). The connection layer of powerful edge devices ("edge devices") is called a "fog layer". The development of a secure fog layer is the central subject of research and innovation in the research project "SecureFog".

SecureFog provides and demonstrates for the first time a secure and at the same time highly efficient IoT platform, exemplary for logistics. The innovative security mechanisms of SecureFog are tailor-made to the requirements of the industrial environment. SecureFog provides both users and service providers with a powerful development environment for fast and secure services in (industrial) IoT.


Our project contribution:

  • Definition of requirements for Securefog
  • Creating the system architecture (functional and security architecture)
  • Development of a practical demonstrator as well as the reference scenarios
  • Involvement and coordination of industry-specific customers and partners

secure fog_graphic

Freie Universität Berlin
The Identity Management working group at FU Berlin has existed since November 2014, the Heisenberg Group Information and Communication Theory since September 2015. Both groups are concerned with the design and evaluation of cryptographic protocols and usable, secure software and IT systems, especially in the environment of Internets of things. The two working groups are developing a highly innovative research approach in close cooperation with the combination of hardware and software-based safety anchors. Based on theoretical work on the formal modeling and analysis of both physical random number generators and Physec-based security mechanisms (taking into account limited hardware resources), cryptographic procedures for the implementation of the protection goals including these security components are developed.



PHYSEC GmbH offers innovative security concepts for authentication and encryption in the Internet of Things. PHYSEC technology is based on the unique combination of complexity and information theory cryptography. Through close cooperation with renowned national and international institutes and universities, PHYSEC is constantly working to improve and further develop the technology.


Technische Universität Berlin

The Department of Telecommunication Networks (TKN) at the TU Berlin is one of the leading research groups in the field of network technologies. TKN is engaged in the design and evaluation of architectures and protocols for communication networks in wireless, mobile communication systems, with special emphasis on performance optimization and quality assurance (QoS).

In the SecureFog project, TKN leads the research activities focused on the development of scalable fog protocols and their evaluation in the TWIST testbed:

  • Energy-efficient networking
  • Proactive caching of security information
  • Orchestration of service components
  • Performance evaluation